963 resultados para IP masquerading


Relevância:

60.00% 60.00%

Publicador:

Resumo:

To construct high performance Web servers, system builders are increasingly turning to distributed designs. An important challenge that arises in distributed Web servers is the need to direct incoming connections to individual hosts. Previous methods for connection routing have employed a centralized node which handles all incoming requests. In contrast, we propose a distributed approach, called Distributed Packet Rewriting (DPR), in which all hosts of the distributed system participate in connection routing. We argue that this approach promises better scalability and fault-tolerance than the centralized approach. We describe our implementation of four variants of DPR and compare their performance. We show that DPR provides performance comparable to centralized alternatives, measured in terms of throughput and delay under the SPECweb96 benchmark. Finally, we argue that DPR is particularly attractive both for small scale systems and for systems following the emerging trend toward increasingly intelligent I/O subsystems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 1986 Vietnam has been engaged in the transition from a centrally-controlled economy to a socialist-oriented market economy (the 'doi moi' renovation). The process for global economic integration has been slow given the magnitude of necessary reforms. Consequently technology entrepreneurs often discount Vietnam as a possible commercialization base which means that it is not realising its economic potential as a hub of technology transfer in the Asia-Pacific region. Three significant factors in the current uncertainty are Vietnam's laws on competition, intellectual property and technology transfer. Another problem is the lack of literature on these laws. This article first discusses the conceptual relationship between competition, intellectual property and technology transfer. Hopefully the article will provide some guidance for the technology entrepreneur considering foreign direct investment (FDI) in Vietnam. The bottom line is that these laws still need further reform to bolster entrepreneurial confidence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the issue of scalability of the detection process to higher network speeds. Using a proof of concept implementation we have shown how pre-onset IP addresses can be efficiently represented using a bit vector and used to modify a “white list” filter in a firewall as part of the mitigation strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1. In March 2009, the Australian Government, through IP Australia its administrator of Intellectual Property Rights (IPR) acquired by registration or grant, issued two consultation papers for comment by interested stakeholders. 2. The Consultation Papers have invited written submissions directed towards the object of the paper, namely encouraging discussion on certain proposed changes and their impact on business and innovation. 3. I understand the invitation to make written submissions is predominantly in the areas raised by the Consultation Papers and the questions posed. However, I have made a brief reference to several other areas of concern with the current Australian patent law, which in my opinion inhibit innovation and therefore come under the wider agenda of the government to work toward a stronger and more efficient IP rights system. 4. In this regard, the Consultation Papers indicate that if the IPR are less likely to be invalidated and more likely to be enforced, this confidence will reflect in a greater investment in research leading to innovation. 5. This submission relates to the Balance Paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission is directed to issues arising in respect of the need to recognise and support access to the internet for all Australian residents and citizens. As such it addresses the following questions only: Questions 2-1: What general principles or criteria should be applied to help determine whether a law that interferes with freedom of speech is justified? Question 2-2: Which Commonwealth laws unjustifiably interfere with freedom of speech, and why are these laws unjustified?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission is directed to issues arising in respect of the need to ensure users are able to access copyright works and as such address the following questions only: Question 6-1: What general principles or criteria should be applied to help determine whether a law that interferes with vested property rights is justified? Question 6-2: Which Commonwealth laws unjustifiably interfere with vested property rights, and why are these laws unjustified?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The only effective and scalable way to regulate the actions of people on the internet is through online intermediaries. These are the institutions that facilitate communication: internet service providers, search engines, content hosts, and social networks. Governments, private firms, and civil society organisations are increasingly seeking to influence these intermediaries to take more responsibility to prevent or respond to IP infringements. Around the world, intermediaries are increasingly subject to a variety of obligations to help enforce IP rights, ranging from informal social and governmental pressure, to industry codes and private negotiated agreements, to formal legislative schemes. This paper provides an overview of this emerging shift in regulatory approaches, away from legal liability and towards increased responsibilities for intermediaries. This shift straddles two different potential futures: an optimistic set of more effective, more efficient mechanisms for regulating user behaviour, and a dystopian vision of rule by algorithm and private power, without the legitimising influence of the rule of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Chapter 6 of IP46, vested property rights are recognised to include “copyright and other intellectual property rights”. For the purposes of the Inquiry “the ALRC [identified it was to consider] ‘vested property rights’ more in its broad, rhetorical sense, than in its technical sense, in which there are distinct shades of meaning of ‘vested’”. However, the Interim Report states that any ‘vested right’ of users of copyright works “has not been identified yet in law”. It is assumed from this that the ALRC is proposing not to further consider the contracting out of the fair dealing exceptions. In light of its prior stated purpose it is submitted this is not appropriate...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless network access is gaining increased heterogeneity in terms of the types of IP capable access technologies. The access network heterogeneity is an outcome of incremental and evolutionary approach of building new infrastructure. The recent success of multi-radio terminals drives both building a new infrastructure and implicit deployment of heterogeneous access networks. Typically there is no economical reason to replace the existing infrastructure when building a new one. The gradual migration phase usually takes several years. IP-based mobility across different access networks may involve both horizontal and vertical handovers. Depending on the networking environment, the mobile terminal may be attached to the network through multiple access technologies. Consequently, the terminal may send and receive packets through multiple networks simultaneously. This dissertation addresses the introduction of IP Mobility paradigm into the existing mobile operator network infrastructure that have not originally been designed for multi-access and IP Mobility. We propose a model for the future wireless networking and roaming architecture that does not require revolutionary technology changes and can be deployed without unnecessary complexity. The model proposes a clear separation of operator roles: (i) access operator, (ii) service operator, and (iii) inter-connection and roaming provider. The separation allows each type of an operator to have their own development path and business models without artificial bindings with each other. We also propose minimum requirements for the new model. We present the state of the art of IP Mobility. We also present results of standardization efforts in IP-based wireless architectures. Finally, we present experimentation results of IP-level mobility in various wireless operator deployments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless access is expected to play a crucial role in the future of the Internet. The demands of the wireless environment are not always compatible with the assumptions that were made on the era of the wired links. At the same time, new services that take advantage of the advances in many areas of technology are invented. These services include delivery of mass media like television and radio, Internet phone calls, and video conferencing. The network must be able to deliver these services with acceptable performance and quality to the end user. This thesis presents an experimental study to measure the performance of bulk data TCP transfers, streaming audio flows, and HTTP transfers which compete the limited bandwidth of the GPRS/UMTS-like wireless link. The wireless link characteristics are modeled with a wireless network emulator. We analyze how different competing workload types behave with regular TPC and how the active queue management, the Differentiated services (DiffServ), and a combination of TCP enhancements affect the performance and the quality of service. We test on four link types including an error-free link and the links with different Automatic Repeat reQuest (ARQ) persistency. The analysis consists of comparing the resulting performance in different configurations based on defined metrics. We observed that DiffServ and Random Early Detection (RED) with Explicit Congestion Notification (ECN) are useful, and in some conditions necessary, for quality of service and fairness because a long queuing delay and congestion related packet losses cause problems without DiffServ and RED. However, we observed situations, where there is still room for significant improvements if the link-level is aware of the quality of service. Only very error-prone link diminishes the benefits to nil. The combination of TCP enhancements improves performance. These include initial window of four, Control Block Interdependence (CBI) and Forward RTO recovery (F-RTO). The initial window of four helps a later starting TCP flow to start faster but generates congestion under some conditions. CBI prevents slow-start overshoot and balances slow start in the presence of error drops, and F-RTO reduces unnecessary retransmissions successfully.